374374 </rule >
375375 <rule >
376376 <key >terraform-CKV_ALI_24</key >
377- <name >Ensure Ram Account Password Policy Max Age less than/equal to 90 days </name >
377+ <name >Ensure RAM enforces MFA </name >
378378 <internalKey >terraform-CKV_ALI_24</internalKey >
379- <description >Ensure Ram Account Password Policy Max Age less than/equal to 90 days </description >
379+ <description >Ensure RAM enforces MFA </description >
380380 <severity >CRITICAL</severity >
381381 <cardinality >SINGLE</cardinality >
382382 <status >READY</status >
522522 <remediationFunction >CONSTANT_ISSUE</remediationFunction >
523523 <remediationFunctionBaseEffort >10min</remediationFunctionBaseEffort >
524524 </rule >
525+ <rule >
526+ <key >terraform-CKV_ALI_34</key >
527+ <name >Ensure RDS instance is set to auto upgrade minor versions</name >
528+ <internalKey >terraform-CKV_ALI_34</internalKey >
529+ <description >Ensure RDS instance is set to auto upgrade minor versions</description >
530+ <severity >CRITICAL</severity >
531+ <cardinality >SINGLE</cardinality >
532+ <status >READY</status >
533+ <type >VULNERABILITY</type >
534+ <tag >security</tag >
535+ <tag >checkov</tag >
536+ <tag >terraform</tag >
537+ <remediationFunction >CONSTANT_ISSUE</remediationFunction >
538+ <remediationFunctionBaseEffort >10min</remediationFunctionBaseEffort >
539+ </rule >
540+ <rule >
541+ <key >terraform-CKV_ALI_35</key >
542+ <name >Ensure RDS instance has log_duration enabled</name >
543+ <internalKey >terraform-CKV_ALI_35</internalKey >
544+ <description >Ensure RDS instance has log_duration enabled</description >
545+ <severity >CRITICAL</severity >
546+ <cardinality >SINGLE</cardinality >
547+ <status >READY</status >
548+ <type >VULNERABILITY</type >
549+ <tag >security</tag >
550+ <tag >checkov</tag >
551+ <tag >terraform</tag >
552+ <remediationFunction >CONSTANT_ISSUE</remediationFunction >
553+ <remediationFunctionBaseEffort >10min</remediationFunctionBaseEffort >
554+ </rule >
555+ <rule >
556+ <key >terraform-CKV_ALI_36</key >
557+ <name >Ensure RDS instance has log_disconnections enabled</name >
558+ <internalKey >terraform-CKV_ALI_36</internalKey >
559+ <description >Ensure RDS instance has log_disconnections enabled</description >
560+ <severity >CRITICAL</severity >
561+ <cardinality >SINGLE</cardinality >
562+ <status >READY</status >
563+ <type >VULNERABILITY</type >
564+ <tag >security</tag >
565+ <tag >checkov</tag >
566+ <tag >terraform</tag >
567+ <remediationFunction >CONSTANT_ISSUE</remediationFunction >
568+ <remediationFunctionBaseEffort >10min</remediationFunctionBaseEffort >
569+ </rule >
570+ <rule >
571+ <key >terraform-CKV_ALI_37</key >
572+ <name >Ensure RDS instance has log_connections enabled</name >
573+ <internalKey >terraform-CKV_ALI_37</internalKey >
574+ <description >Ensure RDS instance has log_connections enabled</description >
575+ <severity >CRITICAL</severity >
576+ <cardinality >SINGLE</cardinality >
577+ <status >READY</status >
578+ <type >VULNERABILITY</type >
579+ <tag >security</tag >
580+ <tag >checkov</tag >
581+ <tag >terraform</tag >
582+ <remediationFunction >CONSTANT_ISSUE</remediationFunction >
583+ <remediationFunctionBaseEffort >10min</remediationFunctionBaseEffort >
584+ </rule >
525585 <rule >
526586 <key >terraform-CKV_ALI_38</key >
527587 <name >Ensure log audit is enabled for RDS</name >
45694629 <remediationFunction >CONSTANT_ISSUE</remediationFunction >
45704630 <remediationFunctionBaseEffort >10min</remediationFunctionBaseEffort >
45714631 </rule >
4632+ <rule >
4633+ <key >terraform-CKV_AWS_262</key >
4634+ <name >Ensure Kendra index Server side encryption uses CMK</name >
4635+ <internalKey >terraform-CKV_AWS_262</internalKey >
4636+ <description >Ensure Kendra index Server side encryption uses CMK</description >
4637+ <severity >CRITICAL</severity >
4638+ <cardinality >SINGLE</cardinality >
4639+ <status >READY</status >
4640+ <type >VULNERABILITY</type >
4641+ <tag >security</tag >
4642+ <tag >checkov</tag >
4643+ <tag >terraform</tag >
4644+ <remediationFunction >CONSTANT_ISSUE</remediationFunction >
4645+ <remediationFunctionBaseEffort >10min</remediationFunctionBaseEffort >
4646+ </rule >
4647+ <rule >
4648+ <key >terraform-CKV_AWS_263</key >
4649+ <name >Ensure App Flow flow uses CMK</name >
4650+ <internalKey >terraform-CKV_AWS_263</internalKey >
4651+ <description >Ensure App Flow flow uses CMK</description >
4652+ <severity >CRITICAL</severity >
4653+ <cardinality >SINGLE</cardinality >
4654+ <status >READY</status >
4655+ <type >VULNERABILITY</type >
4656+ <tag >security</tag >
4657+ <tag >checkov</tag >
4658+ <tag >terraform</tag >
4659+ <remediationFunction >CONSTANT_ISSUE</remediationFunction >
4660+ <remediationFunctionBaseEffort >10min</remediationFunctionBaseEffort >
4661+ </rule >
4662+ <rule >
4663+ <key >terraform-CKV_AWS_264</key >
4664+ <name >Ensure App Flow connector profile uses CMK</name >
4665+ <internalKey >terraform-CKV_AWS_264</internalKey >
4666+ <description >Ensure App Flow connector profile uses CMK</description >
4667+ <severity >CRITICAL</severity >
4668+ <cardinality >SINGLE</cardinality >
4669+ <status >READY</status >
4670+ <type >VULNERABILITY</type >
4671+ <tag >security</tag >
4672+ <tag >checkov</tag >
4673+ <tag >terraform</tag >
4674+ <remediationFunction >CONSTANT_ISSUE</remediationFunction >
4675+ <remediationFunctionBaseEffort >10min</remediationFunctionBaseEffort >
4676+ </rule >
4677+ <rule >
4678+ <key >terraform-CKV_AWS_265</key >
4679+ <name >Ensure Keyspaces Table uses CMK</name >
4680+ <internalKey >terraform-CKV_AWS_265</internalKey >
4681+ <description >Ensure Keyspaces Table uses CMK</description >
4682+ <severity >CRITICAL</severity >
4683+ <cardinality >SINGLE</cardinality >
4684+ <status >READY</status >
4685+ <type >VULNERABILITY</type >
4686+ <tag >security</tag >
4687+ <tag >checkov</tag >
4688+ <tag >terraform</tag >
4689+ <remediationFunction >CONSTANT_ISSUE</remediationFunction >
4690+ <remediationFunctionBaseEffort >10min</remediationFunctionBaseEffort >
4691+ </rule >
4692+ <rule >
4693+ <key >terraform-CKV_AWS_266</key >
4694+ <name >Ensure App Flow connector profile uses CMK</name >
4695+ <internalKey >terraform-CKV_AWS_266</internalKey >
4696+ <description >Ensure App Flow connector profile uses CMK</description >
4697+ <severity >CRITICAL</severity >
4698+ <cardinality >SINGLE</cardinality >
4699+ <status >READY</status >
4700+ <type >VULNERABILITY</type >
4701+ <tag >security</tag >
4702+ <tag >checkov</tag >
4703+ <tag >terraform</tag >
4704+ <remediationFunction >CONSTANT_ISSUE</remediationFunction >
4705+ <remediationFunctionBaseEffort >10min</remediationFunctionBaseEffort >
4706+ </rule >
45724707 <rule >
45734708 <key >terraform-CKV2_AWS_1</key >
45744709 <name >Ensure that all NACL are attached to subnets</name >
75217656 <remediationFunction >CONSTANT_ISSUE</remediationFunction >
75227657 <remediationFunctionBaseEffort >10min</remediationFunctionBaseEffort >
75237658 </rule >
7659+ <rule >
7660+ <key >terraform-CKV_AZURE_161</key >
7661+ <name >Ensures Spring Cloud API Portal is enabled on for HTTPS</name >
7662+ <internalKey >terraform-CKV_AZURE_161</internalKey >
7663+ <description >Ensures Spring Cloud API Portal is enabled on for HTTPS</description >
7664+ <severity >CRITICAL</severity >
7665+ <cardinality >SINGLE</cardinality >
7666+ <status >READY</status >
7667+ <type >VULNERABILITY</type >
7668+ <tag >security</tag >
7669+ <tag >checkov</tag >
7670+ <tag >terraform</tag >
7671+ <tag >owasp-a6</tag >
7672+ <tag >cweid-311</tag >
7673+ <tag >800-53-sc-8</tag >
7674+ <remediationFunction >CONSTANT_ISSUE</remediationFunction >
7675+ <remediationFunctionBaseEffort >10min</remediationFunctionBaseEffort >
7676+ </rule >
7677+ <rule >
7678+ <key >terraform-CKV_AZURE_162</key >
7679+ <name >Ensures Spring Cloud API Portal Public Access Is Disabled</name >
7680+ <internalKey >terraform-CKV_AZURE_162</internalKey >
7681+ <description >Ensures Spring Cloud API Portal Public Access Is Disabled</description >
7682+ <severity >CRITICAL</severity >
7683+ <cardinality >SINGLE</cardinality >
7684+ <status >READY</status >
7685+ <type >VULNERABILITY</type >
7686+ <tag >security</tag >
7687+ <tag >checkov</tag >
7688+ <tag >terraform</tag >
7689+ <tag >owasp-a6</tag >
7690+ <tag >cweid-732</tag >
7691+ <tag >800-53-ac-4</tag >
7692+ <remediationFunction >CONSTANT_ISSUE</remediationFunction >
7693+ <remediationFunctionBaseEffort >10min</remediationFunctionBaseEffort >
7694+ </rule >
75247695 <rule >
75257696 <key >terraform-CKV2_AZURE_1</key >
75267697 <name >Ensure storage for critical data are encrypted with Customer Managed Key</name >
1152811699 </rule >
1152911700
1153011701
11702+
1153111703</rules >
0 commit comments